754 research outputs found

    Additive sparsification of CSPs

    Get PDF
    Multiplicative cut sparsifiers, introduced by Bencz´ur and Karger [STOC’96], have proved extremely influential and found various applications. Precise characterisations were established for sparsifiability of graphs with other 2-variable predicates on Boolean domains by Filtser and Krauthgamer [SIDMA’17] and non-Boolean domains by Butti and Zivn´y [SIDMA’20]. ˇ Bansal, Svensson and Trevisan [FOCS’19] introduced a weaker notion of sparsification termed “additive sparsification”, which does not require weights on the edges of the graph. In particular, Bansal et al. designed algorithms for additive sparsifiers for cuts in graphs and hypergraphs. As our main result, we establish that all Boolean Constraint Satisfaction Problems (CSPs) admit an additive sparsifier; that is, for every Boolean predicate P : {0, 1} k → {0, 1} of a fixed arity k, we show that CSP(P) admits an additive sparsifier. Under our newly introduced notion of all-but-one sparsification for non-Boolean predicates, we show that CSP(P) admits an additive sparsifier for any predicate P : Dk → {0, 1} of a fixed arity k on an arbitrary finite domain D

    The Time for Reconstructing the Attack Graph in DDoS Attacks

    Full text link
    Despite their frequency, denial-of-service (DoS\blfootnote{Denial of Service (DoS), Distributed Denial of Service (DDoS), Probabilistic Packet Marking (PPM), coupon collector's problem (CCP)}) and distributed-denial-of-service (DDoS) attacks are difficult to prevent and trace, thus posing a constant threat. One of the main defense techniques is to identify the source of attack by reconstructing the attack graph, and then filter the messages arriving from this source. One of the most common methods for reconstructing the attack graph is Probabilistic Packet Marking (PPM). We focus on edge-sampling, which is the most common method. Here, we study the time, in terms of the number of packets, the victim needs to reconstruct the attack graph when there is a single attacker. This random variable plays an important role in the reconstruction algorithm. Our main result is a determination of the asymptotic distribution and expected value of this time. The process of reconstructing the attack graph is analogous to a version of the well-known coupon collector's problem (with coupons having distinct probabilities). Thus, the results may be used in other applications of this problem.Comment: 31 pages, 5 figures, 1 tabl

    Graded Orbital Occupation near Interfaces in a La2NiO4 - La2CuO4 Superlattice

    Full text link
    X-ray absorption spectroscopy and resonant soft x-ray reflectivity show a non-uniform distribution of oxygen holes in a La2NiO4 - La2CuO4 (LNO-LCO) superlattice, with excess holes concentrated in the LNO layers. Weak ferromagnetism with Tc = 160 K suggests a coordinated tilting of NiO6 octahedra, similar to that of bulk LNO. Ni d3z2-r2 orbitals within the LNO layers have a spatially variable occupation. This variation of the Ni valence near LNO-LCO interfaces is observed with resonant soft x-ray reflectivity at the Ni L edge, at a reflection suppressed by the symmetry of the structure, and is possible through graded doping with holes, due to oxygen interstitials taken up preferentially by inner LNO layers. Since the density of oxygen atoms in the structure can be smoothly varied with standard procedures, this orbital occupation, robust up to at least 280 K, is tunable.Comment: 11 pages, 8 figure
    • …
    corecore